Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.5. rezultāts no 95.
... Red Hat Linux 7.x.Therefore, most of the CD files are Red Hat Package Manager (.rpm) files.There are also many Tape Archive (.tar) files and GNU Zip (.gzip) files. Instructions for unpacking and installing these files are included in ...
... Red Hat Package Manager 11 Debian 11 Obtaining Open Source Software 12 SourceForge 12 Freshmeat 13 Packetstorm 14 xi SecurityFocus Is That Download Safe? A Brief Encryption Review Symmetric. Contents. Table of Contents.
... Red Hat Linux Errata and Update Service Packages Handling Maintenance Issues Red Hat Linux Errata: Fixes and Advisories Bug Fix Case Study Manually Disabling Unnecessary Services and Ports Services to Disable The xinetd.conf File ...
... Red Hat Linux operating system. Although it may not be the best Linux distribution (there are at least 100 ver- sions in the world), it is the most popular.We have tried to ensure that the skills and tools you obtain in this book will ...
... Linux, open source software generally comes in three flavors: source tarball, Red Hat Package Manager (RPM), and Debian.A source tarball is a group of files and directories that usually must be compiled. Generally, tarballs come with a ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |